In modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis of ciphertext shows that the resulted cipher is robust. Each character in the plaintext has different representations in the ciphertext even if the characters are repeated through the message. The strength of generated cipher was measured through brute force attackers, they were unable to deduce the key from the knowledge about pairs of plaintext- ciphertext due to the fact that each occurrence of characters in the message will have different shift value, and as a result a diverse representation will be obtained for same characters of the message.
Recent years have seen an explosion in graph data from a variety of scientific, social and technological fields. From these fields, emotion recognition is an interesting research area because it finds many applications in real life such as in effective social robotics to increase the interactivity of the robot with human, driver safety during driving, pain monitoring during surgery etc. A novel facial emotion recognition based on graph mining has been proposed in this paper to make a paradigm shift in the way of representing the face region, where the face region is represented as a graph of nodes and edges and the gSpan frequent sub-graphs mining algorithm is used to find the frequent sub-structures in the graph database of each emotion. T
... Show MoreCryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MoreBanned temporarily divers has increased greatly in the society and for silly reasons.
This issue aroused a great controversy .There are so many motivations to Aleve deep in it.
There are so many approach hes to talk it . It deserves to be studied in a simple way but
thoroughly and comprehensively .Dune to this great importees and to its spread among
married couples for their agnorance concerning its voles' and dangers .
I have been stimulated and encouraged to go through and close read its details
aleomplish this research.
It is a olevided in to an introduction and three chapters :
1-chapter one : defines the terminology of banned temporarily clearer's and it legal situation .
2-chapter two : Terms of banned te
The study aimed at identifying the strategic gaps in the actual reality of the management of public organizations investigated to determine the strategy used based on the study model. The study relied on the variable of the general organization strategy in its dimensions (the general organization strategy, the organization's political strategy and the defense strategy of the organization) The sample of the study was (General Directorate of Traffic, Civil Status Directorate and Civil Defense Directorate), formations affiliated to the Ministry of the Interior, for the importance of the activity carried out by these public organizations by providing them In order to translate the answers into a quantitative expression in the analysi
... Show MoreBackground: Glass ionomer restorations are widely employed in the field of pediatric dentistry. There is a constant demand for a durable restoration that remains functional until exfoliation. This study aimed to measure and compare the effect of a novel coating material (EQUIA Forte Coat) on the microleakage of glass hybrid restoration (EQUIA Forte HT) in primary teeth. Material and method: Thirty cavitated (class-II) primary molars were allocated randomly into two groups based on the coat application; uncoated (control) and coated group (experimental). Cavities were prepared by the use of a ceramic bur (CeraBur) and restored with EQUIA Forte HT with or without applying a protective coat (EQUIA Forte Coat). Samples went through the
... Show MoreBackground: Glass ionomer restorations are widely employed in the field of pediatric dentistry. There is a constant demand for a durable restoration that remains functional until exfoliation. This study aimed to measure and compare the effect of a novel coating material (EQUIA Forte Coat) on the microleakage of glass hybrid restoration (EQUIA Forte HT) in primary teeth. Material and method: Thirty cavitated (class-II) primary molars were allocated randomly into two groups based on the coat application; uncoated (control) and coated group (experimental). Cavities were prepared by the use of a ceramic bur (CeraBur) and restored with EQUIA Forte HT with or without applying a protective coat (EQUIA Forte Coat). Samples went through the therm
... Show MoreMaintaining and breeding fish in a pond are a crucial task for a large fish breeder. The main issues for fish breeders are pond management such as the production of food for fishes and to maintain the pond water quality. The dynamic or technological system for breeders has been invented and becomes important to get maximum profit return for aquaponic breeders in maintaining fishes. This research presents a developed prototype of a dynamic fish feeder based on fish existence. The dynamic fish feeder is programmed to feed where sensors detected the fish's existence. A microcontroller board NodeMCU ESP8266 is programmed for the developed h
... Show MoreRecommender Systems are tools to understand the huge amount of data available in the internet world. Collaborative filtering (CF) is one of the most knowledge discovery methods used positively in recommendation system. Memory collaborative filtering emphasizes on using facts about present users to predict new things for the target user. Similarity measures are the core operations in collaborative filtering and the prediction accuracy is mostly dependent on similarity calculations. In this study, a combination of weighted parameters and traditional similarity measures are conducted to calculate relationship among users over Movie Lens data set rating matrix. The advantages and disadvantages of each measure are spotted. From the study, a n
... Show MoreIn regression testing, Test case prioritization (TCP) is a technique to arrange all the available test cases. TCP techniques can improve fault detection performance which is measured by the average percentage of fault detection (APFD). History-based TCP is one of the TCP techniques that consider the history of past data to prioritize test cases. The issue of equal priority allocation to test cases is a common problem for most TCP techniques. However, this problem has not been explored in history-based TCP techniques. To solve this problem in regression testing, most of the researchers resort to random sorting of test cases. This study aims to investigate equal priority in history-based TCP techniques. The first objective is to implement
... Show MoreActive learning is a teaching method that involves students actively participating in activities, exercises, and projects within a rich and diverse educational environment. The teacher plays a role in encouraging students to take responsibility for their own education under their scientific and pedagogical supervision and motivates them to achieve ambitious educational goals that focus on developing an integrated personality for today’s students and tomorrow’s leaders. It is important to understand the impact of two proposed strategies based on active learning on the academic performance of first-class intermediate students in computer subjects and their social intelligence. The research sample was intentionally selected, consis
... Show More